{"id":"https://openalex.org/W3200135720","doi":"https://doi.org/10.4018/ijegr.2021100103","title":"Exploring the Relationship Between Technology Adoption and Cyber Security Compliance","display_name":"Exploring the Relationship Between Technology Adoption and Cyber Security Compliance","publication_year":2021,"publication_date":"2021-09-20","ids":{"openalex":"https://openalex.org/W3200135720","doi":"https://doi.org/10.4018/ijegr.2021100103","mag":"3200135720"},"language":"en","primary_location":{"id":"doi:10.4018/ijegr.2021100103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijegr.2021100103","pdf_url":null,"source":{"id":"https://openalex.org/S118683372","display_name":"International Journal of Electronic Government Research","issn_l":"1548-3886","issn":["1548-3886","1548-3894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Government Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073263145","display_name":"Mohammed Alqahtani","orcid":"https://orcid.org/0000-0003-0581-5674"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mohammed Saeed A Alqahtani","raw_affiliation_strings":["University of Technology Sydney, Australia"],"raw_orcid":"https://orcid.org/0000-0003-0581-5674","affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000982178","display_name":"Eila Erfani","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Eila Erfani","raw_affiliation_strings":["University of Technology Sydney, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073263145"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":1.4237,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.85916405,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"17","issue":"4","first_page":"40","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.5686812996864319},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5488302707672119},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5259742140769958},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4765121042728424},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.43709832429885864},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42040693759918213},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.4138012230396271},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4135807752609253},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.34459203481674194},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3128909766674042},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13588210940361023},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.08115816116333008}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.5686812996864319},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5488302707672119},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5259742140769958},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4765121042728424},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.43709832429885864},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42040693759918213},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.4138012230396271},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4135807752609253},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.34459203481674194},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3128909766674042},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13588210940361023},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.08115816116333008},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijegr.2021100103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijegr.2021100103","pdf_url":null,"source":{"id":"https://openalex.org/S118683372","display_name":"International Journal of Electronic Government Research","issn_l":"1548-3886","issn":["1548-3886","1548-3894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Electronic Government Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W115894563","https://openalex.org/W134888685","https://openalex.org/W1903013269","https://openalex.org/W1969967787","https://openalex.org/W1987258130","https://openalex.org/W1997402591","https://openalex.org/W2010902645","https://openalex.org/W2017609493","https://openalex.org/W2025148060","https://openalex.org/W2033213440","https://openalex.org/W2076538849","https://openalex.org/W2096563449","https://openalex.org/W2099647042","https://openalex.org/W2100379340","https://openalex.org/W2114299207","https://openalex.org/W2209024180","https://openalex.org/W2214824317","https://openalex.org/W2398260438","https://openalex.org/W2503064373","https://openalex.org/W2556137844","https://openalex.org/W2566406266","https://openalex.org/W2606858076","https://openalex.org/W2623680183","https://openalex.org/W2624509573","https://openalex.org/W2754794588","https://openalex.org/W2770081621","https://openalex.org/W2792624926","https://openalex.org/W2792910346","https://openalex.org/W2796276470","https://openalex.org/W2898933733","https://openalex.org/W2967979947","https://openalex.org/W2996677143","https://openalex.org/W3005189649","https://openalex.org/W3007165053","https://openalex.org/W3007177564","https://openalex.org/W3034792594","https://openalex.org/W3125856483","https://openalex.org/W3125976894","https://openalex.org/W3168494627"],"related_works":["https://openalex.org/W2560936962","https://openalex.org/W2788727012","https://openalex.org/W2410395228","https://openalex.org/W2526386912","https://openalex.org/W4388203630","https://openalex.org/W3125941065","https://openalex.org/W2410591377","https://openalex.org/W2484615095","https://openalex.org/W4366449942","https://openalex.org/W2323113755"],"abstract_inverted_index":{"IT":[0,101],"infrastructure":[1],"and":[2,9,20,26,30,37,57,64,80,104,113,120],"systems":[3,11],"are":[4,22,28],"made":[5],"up":[6],"of":[7,47,111,115,124],"technical":[8],"social":[10],"that":[12,17,86],"work":[13],"together":[14],"to":[15,32,71,76],"ensure":[16],"organization's":[18,35],"goals":[19],"objectives":[21],"met.":[23],"Security":[24],"controls":[25],"measures":[27],"developed":[29],"used":[31],"protect":[33],"an":[34,92],"data":[36],"information":[38],"systems.":[39],"To":[40],"improve":[41],"cyber":[42,88,128],"security,":[43],"organizations":[44],"focus":[45],"most":[46,62],"their":[48],"efforts":[49],"on":[50,127],"incorporating":[51],"new":[52],"technological":[53],"approaches":[54],"in":[55,91,131],"products":[56],"processes,":[58],"leaving":[59],"out":[60],"the":[61,77,84,108,122],"important":[63],"vulnerable":[65],"factor.":[66],"So":[67],"this":[68],"study":[69],"intends":[70],"provide":[72],"some":[73],"practical":[74],"implications":[75],"technology":[78],"developers":[79],"policymakers":[81],"while":[82],"identifying":[83],"factors":[85,126],"affect":[87],"security":[89,129],"compliance":[90,130],"organization":[93],"or":[94],"home":[95],"environment":[96],"for":[97],"general":[98],"users,":[99],"HR,":[100],"administrators,":[102],"engineers,":[103],"others.":[105],"It":[106],"explored":[107],"Unified":[109],"Theory":[110],"Acceptance":[112],"Use":[114],"Technology":[116],"2":[117],"(UTAUT2)":[118],"model":[119],"assessed":[121],"effect":[123],"its":[125],"organizations.":[132]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
